US20080148395A1 - System and method for securing settings of a computing device - Google Patents

System and method for securing settings of a computing device Download PDF

Info

Publication number
US20080148395A1
US20080148395A1 US11/585,635 US58563506A US2008148395A1 US 20080148395 A1 US20080148395 A1 US 20080148395A1 US 58563506 A US58563506 A US 58563506A US 2008148395 A1 US2008148395 A1 US 2008148395A1
Authority
US
United States
Prior art keywords
user
setting
authentication data
parameter
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/585,635
Inventor
Chris Brock
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Symbol Technologies LLC
Original Assignee
Symbol Technologies LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Symbol Technologies LLC filed Critical Symbol Technologies LLC
Priority to US11/585,635 priority Critical patent/US20080148395A1/en
Assigned to SYMBOL TECHNOLOGIES, INC. reassignment SYMBOL TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BROCK, CHRIS
Publication of US20080148395A1 publication Critical patent/US20080148395A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Definitions

  • the present invention generally relates to systems and methods for securing settings of a computing device.
  • the present invention relates to securing settings of a data capture device such as, for example, a barcode scanner and/or a radio frequency identification (RFID) reader.
  • RFID radio frequency identification
  • settings for a conventional computing device are initially configured by a manufacturer. This allows the computing device to be used out-of-the-box without requiring manual configuration prior to use.
  • the settings are typically customizable and reconfigurable based on, for example, user preferences, operating environments, intended uses, etc.
  • an employee may reconfigure the settings based on personal preference, even though an employer may desire the computing device to predefined settings. For example, the employee may adjust a brightness level of a display screen of the computing device to a maximum level. While this is a departure from the predefined settings, this setting may also unnecessarily waste power available to the computing device.
  • a subsequent user of the computing device may waste time reconfiguring the settings based on his personal preferences. Thus, there is a need to restrict access to the settings of the computing device.
  • a barcode scanner comprises a memory storing a first parameter for a setting, an input arrangement receiving first authentication data from a user of the scanner and a processor comparing the first authentication data to stored data to authenticate the user.
  • the stored data includes second authentication data corresponding to at least one user authorized to reconfigure the setting. If the user is authenticated, the processor adjusts the setting with a second parameter received from the user.
  • FIG. 1 shows an exemplary embodiment of a system according to the present invention.
  • FIG. 2 shows an exemplary embodiment of a method according to the present invention.
  • the present invention may be further understood with reference to the following description and the attached drawings, wherein like elements are referred to with the same reference numerals.
  • the exemplary embodiments of the present invention describe a system and method for securing settings of a computing device. Although the exemplary embodiments will be described with reference to a mobile computing device and, in particular, a barcode scanner, those of skill in the art will understand that the systems and methods for securing settings may be similarly implemented on stationary computing devices such as, for example, PCs, copiers, fax machines, sound systems, display screens, smart appliances, etc.
  • FIG. 1 shows an exemplary embodiment of a system 2 for securing settings on a computing device according to the present invention.
  • the system 2 may comprise components typically utilized in a wired/wireless local area network (LAN).
  • the system 2 may include a server 4 that is coupled to a wireless access point (AP) 6 via a communications network 8 .
  • the network 8 may comprise one or more network computing devices (e.g., routers, bridges, repeaters, etc.) which are part of and/or connected to other communications networks (e.g., further LANs, an intranet, a wide area network, the Internet).
  • the server 4 may also have access to a database 10 which may be used in an authentication procedure, as will be described further below.
  • the AP 6 provides wireless access to the server 4 and the network 8 for a mobile computing unit (MU) 12 .
  • the MU 12 may be a processor-based computing device which includes a memory and a wireless transceiver for conducting wireless communications with the AP 6 (e.g., according to an IEEE 802.11 protocol).
  • the MU 12 may be an imager-/laser-based scanner, an RFID reader, a mobile phone, a PDA, a laptop, a tablet computer, a digital camera, a portable media player, a handheld computer, etc.
  • the memory of the MU 12 stores setting data corresponding to at least one setting of the MU 12 .
  • the settings may include, for example, barcode symbologies recognized by the MU 12 , a date/time, a display characteristic (e.g., volume, LCD brightness), a power-save mode time, a scan session time, wireless communications, etc.
  • a display characteristic e.g., volume, LCD brightness
  • the setting data may further include a parameter which corresponds to each of the settings and is used for current operation of the MU 12 .
  • the setting for the LCD brightness may include a parameter indicative of a brightness level.
  • access to the setting data is restricted by a security mechanism (e.g., password, biometric, location-based, MU identifier, etc.). That is, the security mechanism may prevent an unauthorized user from reconfiguring a setting with a new parameter.
  • a security mechanism e.g., password, biometric, location-based, MU identifier, etc.
  • an employer may implement the security mechanism to ensure that employees do not reconfigure the setting data.
  • the setting data may be configured with a parameter(s) indicating that the MU 12 should only recognize proprietary barcodes utilized in the employer's store. If the setting data was reconfigured to recognize standard barcodes (e.g., UPC, EAN), the MU 12 may improperly recognize or decode the proprietary barcodes.
  • standard barcodes e.g., UPC, EAN
  • the setting data may be configured with a parameter(s) indicative of a current date and time.
  • the MU 12 may be used for age verification procedures during the purchase of tobacco, alcohol, firearms, video games, movies, magazines, etc. Allowing an employee to reconfigure the current date and time may enable underage persons to obtain these items.
  • the setting data may be configured with a parameter(s) indicative of one or more display characteristics. That is, the employer may determine parameters for LCD brightness and volume which are sufficient for the employees to conduct their assigned tasks in known environments (e.g., retail store, warehouse, shipping yard, etc.). Using these parameters, the MU 12 will not have to be recharged during the tasks. In addition, the MU 12 will operate uniformly between uses and users. Allowing the employees to alter the setting(s) for the display characteristic(s) may unnecessarily waste battery power of the MU 12 and time for subsequent users of the MU 12 .
  • a parameter(s) indicative of one or more display characteristics e.g., the employer may determine parameters for LCD brightness and volume which are sufficient for the employees to conduct their assigned tasks in known environments (e.g., retail store, warehouse, shipping yard, etc.). Using these parameters, the MU 12 will not have to be recharged during the tasks. In addition, the MU 12 will operate uniformly between uses and users. Allowing the employees to alter the setting(
  • FIG. 2 shows an exemplary embodiment of a method 200 for securing settings on a computing device according to the present invention.
  • the method 200 describes a process for authenticating a user, and determining whether the user is authorized to enter a new parameter for reconfiguring a setting of the MU 12 . While the exemplary embodiment will be described with reference to the server 4 executing the authentication procedure, those of skill in the art will understand that the authentication procedure may be similarly implemented by the MU 12 . That is, the MU 12 may execute the full authentication process without communicating with the network 8 or the server 4 . In this embodiment, the MU 12 may not include the wireless transceiver.
  • a setting is selected by the MU 12 in response to a user indication, e.g., a selection of the setting via a user interface (e.g., touch screen/pad, keypad, etc.) of the MU 12 .
  • the processor of the MU 12 may interpret the selection and select the corresponding setting.
  • a parameter associated with the setting may be displayed on a display screen of the MU 12 .
  • the MU 12 receives authentication data from the user. That is, if the user attempts to change the parameter for the setting, the MU 12 may prompt the user for the authentication data.
  • the authentication data may be, for example, a password, a PIN code, a biometric identifier (e.g., retina scan, fingerprint, voice), a handwriting sample (e.g., a signature), etc. and received via an input arrangement (e.g., a keypad, a laser-based scanner, an image capture device, a biometric reader, a touch screen and a touch pad).
  • the user interface of the MU 12 or a peripheral device e.g., a barcode scanner
  • the scanner may scan a barcode on the user's identification badge and/or may scan barcodes associated with commands and/or alphanumeric characters.
  • the scanner may scan a command barcode for entering a password, then scan letter/number barcodes and finally scan an input barcode so that the password is assembled by the MU 12 to complete the authentication data.
  • the MU 12 transmits the authentication data to the server 4 , and the server 4 compares the authentication data to stored data in the database 10 .
  • the stored data may be input by an administrator and correspond to authentication data of users authorized to adjust the setting(s) of the MU 12 .
  • the stored data may correspond to an initial password stored on the MU 12 or input by the user upon a first use of the MU 12 .
  • the authentication data may authorize the user to change a plurality of settings on the MU 12 . That is, one password may allow the user to change any or selected ones of the settings on the MU 12 .
  • a separate password may be required to change each of the settings. For example, the user may be given a password to change the parameters for the display characteristics of the MU 12 , but not the date/time parameter.
  • the server 4 compares the authentication data to the stored data and generates result data indicating whether the user is authorized to change the parameter for the setting.
  • the authentication procedure may be performed locally by the MU 12 .
  • the stored data may be stored in the memory of the MU 12 .
  • the store data may be updated periodically by, for example, downloading the stored data from the server 4 and replacing it in the memory of the MU 12 . In this manner, the administrator may authorize users to change the settings from a remote location.
  • the result data indicates that the authentication data does not match the stored data.
  • the result data is transmitted to the MU 12 , and the MU 12 disallows the user's request to enter a new parameter for the setting.
  • the result data indicates that the authentication data matched the stored data.
  • the result data is transmitted to the MU 12 , and the user is allowed to enter a new parameter for the setting.
  • the MU 12 reconfigures the setting with the new parameter.
  • the result data may include a limit on the new parameter.
  • the limit may indicate that the new parameter for the LCD brightness must be within a predefined range.
  • the MU 12 may deny the change if the new parameter is outside of the limit.
  • the result data may include a predetermined list of parameters from which the user may choose.
  • the server 4 may utilize an override after determining whether the user is authorized to change the setting. For example, a comparison of the authentication data to the stored data may indicate that the user is not authorized to change the setting. However, based on a location of the MU 12 , a time of use, etc., the result data may be overridden to indicate that the user is authorized to change the setting or may impose a less stringent limit on the new parameter. Alternatively, the override may be implemented as an expanded limit/range for the new parameter.
  • An exemplary scenario in which the location may be utilized is when the MU 12 is being used in a shipping yard. The user may be unauthorized to change the LCD brightness. However, because the MU 12 is being used in the shipping yard, the server 8 may authorize the user to change the setting. Thus, on an overnight shift, the user may adjust the LCD brightness.

Abstract

Described is a system and method for securing settings of a computing device. A data capture device comprises a memory storing a first parameter for a setting, an input arrangement receiving first authentication data from a user of the scanner and a processor comparing the first authentication data to stored data to authenticate the user. The stored data includes second authentication data corresponding to at least one user authorized to reconfigure the setting. If the user is authenticated, the processor adjusts the setting with a second parameter received from the user.

Description

    FIELD OF INVENTION
  • The present invention generally relates to systems and methods for securing settings of a computing device. In particular, the present invention relates to securing settings of a data capture device such as, for example, a barcode scanner and/or a radio frequency identification (RFID) reader.
  • BACKGROUND
  • Generally, settings for a conventional computing device are initially configured by a manufacturer. This allows the computing device to be used out-of-the-box without requiring manual configuration prior to use. However, the settings are typically customizable and reconfigurable based on, for example, user preferences, operating environments, intended uses, etc.
  • Typically, there is no restriction on reconfiguring the settings. Thus, an employee may reconfigure the settings based on personal preference, even though an employer may desire the computing device to predefined settings. For example, the employee may adjust a brightness level of a display screen of the computing device to a maximum level. While this is a departure from the predefined settings, this setting may also unnecessarily waste power available to the computing device. In addition, a subsequent user of the computing device may waste time reconfiguring the settings based on his personal preferences. Thus, there is a need to restrict access to the settings of the computing device.
  • SUMMARY OF THE INVENTION
  • The present invention relates to a system and method for securing settings of a computing device. A barcode scanner comprises a memory storing a first parameter for a setting, an input arrangement receiving first authentication data from a user of the scanner and a processor comparing the first authentication data to stored data to authenticate the user. The stored data includes second authentication data corresponding to at least one user authorized to reconfigure the setting. If the user is authenticated, the processor adjusts the setting with a second parameter received from the user.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows an exemplary embodiment of a system according to the present invention.
  • FIG. 2 shows an exemplary embodiment of a method according to the present invention.
  • DETAILED DESCRIPTION
  • The present invention may be further understood with reference to the following description and the attached drawings, wherein like elements are referred to with the same reference numerals. The exemplary embodiments of the present invention describe a system and method for securing settings of a computing device. Although the exemplary embodiments will be described with reference to a mobile computing device and, in particular, a barcode scanner, those of skill in the art will understand that the systems and methods for securing settings may be similarly implemented on stationary computing devices such as, for example, PCs, copiers, fax machines, sound systems, display screens, smart appliances, etc.
  • FIG. 1 shows an exemplary embodiment of a system 2 for securing settings on a computing device according to the present invention. The system 2 may comprise components typically utilized in a wired/wireless local area network (LAN). For example, the system 2 may include a server 4 that is coupled to a wireless access point (AP) 6 via a communications network 8. The network 8 may comprise one or more network computing devices (e.g., routers, bridges, repeaters, etc.) which are part of and/or connected to other communications networks (e.g., further LANs, an intranet, a wide area network, the Internet). The server 4 may also have access to a database 10 which may be used in an authentication procedure, as will be described further below.
  • The AP 6 provides wireless access to the server 4 and the network 8 for a mobile computing unit (MU) 12. The MU 12 may be a processor-based computing device which includes a memory and a wireless transceiver for conducting wireless communications with the AP 6 (e.g., according to an IEEE 802.11 protocol). The MU 12 may be an imager-/laser-based scanner, an RFID reader, a mobile phone, a PDA, a laptop, a tablet computer, a digital camera, a portable media player, a handheld computer, etc.
  • The memory of the MU 12 stores setting data corresponding to at least one setting of the MU 12. The settings may include, for example, barcode symbologies recognized by the MU 12, a date/time, a display characteristic (e.g., volume, LCD brightness), a power-save mode time, a scan session time, wireless communications, etc. Those of skill in the art will understand that the present invention may be similarly implemented for any other setting utilized by the MU 12. The setting data may further include a parameter which corresponds to each of the settings and is used for current operation of the MU 12. For example, the setting for the LCD brightness may include a parameter indicative of a brightness level.
  • In the exemplary embodiment, access to the setting data is restricted by a security mechanism (e.g., password, biometric, location-based, MU identifier, etc.). That is, the security mechanism may prevent an unauthorized user from reconfiguring a setting with a new parameter. In one exemplary use, an employer may implement the security mechanism to ensure that employees do not reconfigure the setting data. For example, the setting data may be configured with a parameter(s) indicating that the MU 12 should only recognize proprietary barcodes utilized in the employer's store. If the setting data was reconfigured to recognize standard barcodes (e.g., UPC, EAN), the MU 12 may improperly recognize or decode the proprietary barcodes.
  • In another exemplary use, the setting data may be configured with a parameter(s) indicative of a current date and time. In this manner, the MU 12 may be used for age verification procedures during the purchase of tobacco, alcohol, firearms, video games, movies, magazines, etc. Allowing an employee to reconfigure the current date and time may enable underage persons to obtain these items.
  • In a further exemplary use, the setting data may be configured with a parameter(s) indicative of one or more display characteristics. That is, the employer may determine parameters for LCD brightness and volume which are sufficient for the employees to conduct their assigned tasks in known environments (e.g., retail store, warehouse, shipping yard, etc.). Using these parameters, the MU 12 will not have to be recharged during the tasks. In addition, the MU 12 will operate uniformly between uses and users. Allowing the employees to alter the setting(s) for the display characteristic(s) may unnecessarily waste battery power of the MU 12 and time for subsequent users of the MU 12.
  • FIG. 2 shows an exemplary embodiment of a method 200 for securing settings on a computing device according to the present invention. The method 200 describes a process for authenticating a user, and determining whether the user is authorized to enter a new parameter for reconfiguring a setting of the MU 12. While the exemplary embodiment will be described with reference to the server 4 executing the authentication procedure, those of skill in the art will understand that the authentication procedure may be similarly implemented by the MU 12. That is, the MU 12 may execute the full authentication process without communicating with the network 8 or the server 4. In this embodiment, the MU 12 may not include the wireless transceiver.
  • In step 202, a setting is selected by the MU 12 in response to a user indication, e.g., a selection of the setting via a user interface (e.g., touch screen/pad, keypad, etc.) of the MU 12. The processor of the MU 12 may interpret the selection and select the corresponding setting. A parameter associated with the setting may be displayed on a display screen of the MU 12.
  • In step 204, the MU 12 receives authentication data from the user. That is, if the user attempts to change the parameter for the setting, the MU 12 may prompt the user for the authentication data. The authentication data may be, for example, a password, a PIN code, a biometric identifier (e.g., retina scan, fingerprint, voice), a handwriting sample (e.g., a signature), etc. and received via an input arrangement (e.g., a keypad, a laser-based scanner, an image capture device, a biometric reader, a touch screen and a touch pad). Those of skill in the art will understand that the user interface of the MU 12 or a peripheral device (e.g., a barcode scanner) coupled thereto or integral therewith may be utilized to receive the authentication data. For example, the scanner may scan a barcode on the user's identification badge and/or may scan barcodes associated with commands and/or alphanumeric characters. In the latter case, the scanner may scan a command barcode for entering a password, then scan letter/number barcodes and finally scan an input barcode so that the password is assembled by the MU 12 to complete the authentication data.
  • In step 206, the MU 12 transmits the authentication data to the server 4, and the server 4 compares the authentication data to stored data in the database 10. The stored data may be input by an administrator and correspond to authentication data of users authorized to adjust the setting(s) of the MU 12. Alternatively, the stored data may correspond to an initial password stored on the MU 12 or input by the user upon a first use of the MU 12. In one exemplary embodiment, the authentication data may authorize the user to change a plurality of settings on the MU 12. That is, one password may allow the user to change any or selected ones of the settings on the MU 12. In another exemplary embodiment, a separate password may be required to change each of the settings. For example, the user may be given a password to change the parameters for the display characteristics of the MU 12, but not the date/time parameter.
  • In the exemplary embodiment, the server 4 compares the authentication data to the stored data and generates result data indicating whether the user is authorized to change the parameter for the setting. As noted above, the authentication procedure may be performed locally by the MU 12. In this instance, the stored data may be stored in the memory of the MU 12. The store data may be updated periodically by, for example, downloading the stored data from the server 4 and replacing it in the memory of the MU 12. In this manner, the administrator may authorize users to change the settings from a remote location.
  • In step 208, the result data indicates that the authentication data does not match the stored data. The result data is transmitted to the MU 12, and the MU 12 disallows the user's request to enter a new parameter for the setting. In step 210, the result data indicates that the authentication data matched the stored data. The result data is transmitted to the MU 12, and the user is allowed to enter a new parameter for the setting. In step 212, the MU 12 reconfigures the setting with the new parameter.
  • In another exemplary embodiment, the result data may include a limit on the new parameter. For example, the limit may indicate that the new parameter for the LCD brightness must be within a predefined range. The MU 12 may deny the change if the new parameter is outside of the limit. Alternatively, the result data may include a predetermined list of parameters from which the user may choose.
  • In a further exemplary embodiment, the server 4 may utilize an override after determining whether the user is authorized to change the setting. For example, a comparison of the authentication data to the stored data may indicate that the user is not authorized to change the setting. However, based on a location of the MU 12, a time of use, etc., the result data may be overridden to indicate that the user is authorized to change the setting or may impose a less stringent limit on the new parameter. Alternatively, the override may be implemented as an expanded limit/range for the new parameter. An exemplary scenario in which the location may be utilized is when the MU 12 is being used in a shipping yard. The user may be unauthorized to change the LCD brightness. However, because the MU 12 is being used in the shipping yard, the server 8 may authorize the user to change the setting. Thus, on an overnight shift, the user may adjust the LCD brightness.
  • The present invention has been described with the reference to the above exemplary embodiments. However, those of skill in the art will understand that various modifications and changes may be made to the embodiments without departing from the broadest spirit and scope of the present invention as set forth in the claims that follow. The specification and drawings, accordingly, should be regarded in an illustrative rather than restrictive sense.

Claims (26)

1. A data capture device, comprising:
a memory storing a first parameter for a setting;
an input arrangement receiving first authentication data from a user of the scanner; and
a processor comparing the first authentication data to stored data to authenticate the user, the stored data including second authentication data corresponding to at least one user authorized to reconfigure the setting,
wherein, if the user is authenticated, the processor adjusts the setting with a second parameter received from the user.
2. The device according to claim 1, wherein the device includes at least one of a barcode scanner and an RFID reader.
3. The device according to claim 1, wherein the setting is one of (i) a recognized barcode symbology, (ii) a date, (iii) a time, (iv) a display characteristic, (v) a power-save mode duration, (vi) a scan session time and (vii) a wireless communication mode.
4. The device according to claim 3, wherein the display characteristics is one of (i) an output volume and (ii) a display screen brightness.
5. The device according to claim 1, wherein the input arrangement includes at least one of (i) a keypad, (ii) a laser-based scanner, (iii) an image capture device, (iv) a biometric reader, (v) a touch screen and (vi) a touch pad.
6. The device according to claim 5, wherein the biometric reader is one of a retinal scanner, a fingerprint reader, a voice recognition device and a signature capture device.
7. The device according to claim 1, wherein the first authentication data includes at least one of a password, a username, a biometric, a location of the device and a device identifier of the device.
8. The device according to claim 1, wherein at least one of the password and the username is entered into the device by one of (i) scanning barcodes associated with characters and commands and (ii) transferring the password and the username from a computing device to the device.
9. The device according to claim 8, wherein the barcodes represent at least one of alphanumeric characters and binary data.
10. The device according to claim 1, wherein the stored data is stored in the memory.
11. The device according to claim 1, wherein the stored data is associated with a predefined range, and the processor determines whether the second parameter is within the predefined range prior to adjusting the setting.
12. The device according to claim 1, wherein, when the user is not authenticated, the processor authenticates the user as a function of at least one of a location of the device and a time of receipt of the first authentication data.
13. A method, comprising:
selecting a setting on a data capture device, the setting being configured with a first parameter;
receiving first authentication data from a user of the device;
comparing the first authentication data to second authentication data, the second authentication data corresponding to at least one user authorized to reconfigure the setting; and
if the user is authenticated, adjusting the setting with a second parameter received from the user.
14. The method according to claim 13, wherein the device includes at least one of a barcode scanner and an RFID reader.
15. The method according to claim 13, wherein the second authentication data is associated with a predefined range.
16. The method according to claim 15, further comprising:
adjusting the setting with the second parameter only if the second parameter is within the predefined range.
17. The method according to claim 13, further comprising:
if the user is not authenticated, authenticating the user as a function of at least one of a location of the device and a time of receipt of the first authentication data.
18. The method according to claim 13, wherein the setting is one of (i) a recognized barcode symbology, (ii) a date, (iii) a time, (iv) a display characteristic, (v) a power-save mode duration, (vi) a scan session time and (vii) a wireless communication mode.
19. The method according to claim 18, wherein the display characteristics is one of (i) an output volume and (ii) a display screen brightness.
20. The method according to claim 13, wherein the input arrangement includes at least one of (i) a keypad, (ii) a laser-based scanner, (iii) an image capture device, (iv) a biometric reader, (v) a touch screen and (vi) a touch pad.
21. The method according to claim 20, wherein the biometric reader is one of a retinal scanner, a fingerprint reader, a voice recognition device and a signature capture device.
22. The method according to claim 13, wherein the second authentication data is stored in a memory of the device.
23. A system, comprising:
a mobile computing device storing a first parameter for a setting, the mobile computing device receiving first authentication data from a user; and
a server comparing the first authentication data to stored data to authenticate the user, the stored data including second authentication data corresponding to at least one user authorized to reconfigure the setting,
wherein, if the user is authenticated, the mobile computing device adjusts the setting with a second parameter received from the user.
24. The system according to claim 23, wherein the mobile computing device is one of an imager-based scanner, a laser-based scanner, an RFID reader, a mobile phone, a PDA, a digital camera, a digital media player, a tablet computer and a laptop.
25. The system according to claim 23, wherein the second authentication data is associated with a predefined range, and wherein the mobile computing device adjusts the settings only if the second parameter is within the predefined range.
26. A barcode scanner, comprising:
a memory means for storing a first parameter for a setting;
an input means for receiving first authentication data from a user of the scanner; and
a processing means comparing the first authentication data to stored data to authenticate the user, the stored data including second authentication data corresponding to at least one user authorized to reconfigure the setting,
wherein, if the user is authenticated, the processing means adjusts the setting with a second parameter received from the user.
US11/585,635 2006-10-24 2006-10-24 System and method for securing settings of a computing device Abandoned US20080148395A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/585,635 US20080148395A1 (en) 2006-10-24 2006-10-24 System and method for securing settings of a computing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/585,635 US20080148395A1 (en) 2006-10-24 2006-10-24 System and method for securing settings of a computing device

Publications (1)

Publication Number Publication Date
US20080148395A1 true US20080148395A1 (en) 2008-06-19

Family

ID=39529276

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/585,635 Abandoned US20080148395A1 (en) 2006-10-24 2006-10-24 System and method for securing settings of a computing device

Country Status (1)

Country Link
US (1) US20080148395A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100042827A1 (en) * 2008-08-15 2010-02-18 At&T Intellectual Property I, L.P. User identification in cell phones based on skin contact
US20100039214A1 (en) * 2008-08-15 2010-02-18 At&T Intellectual Property I, L.P. Cellphone display time-out based on skin contact
US20100085153A1 (en) * 2008-09-05 2010-04-08 Smith Gaylan S Biometric Control System and Method For Machinery
US20110202983A1 (en) * 2009-08-19 2011-08-18 Solarflare Communications Incorporated Remote functionality selection
US20110320352A1 (en) * 2010-06-23 2011-12-29 The Western Union Company Biometrically secured user input for forms
CN103023652A (en) * 2012-12-07 2013-04-03 康佳集团股份有限公司 Status identification method and system through bar code based on mobile terminal
US20140026209A1 (en) * 2012-07-18 2014-01-23 Canon Kabushiki Kaisha Distribution device, image forming device, system, control method and storage medium
US20140181710A1 (en) * 2012-12-26 2014-06-26 Harman International Industries, Incorporated Proximity location system
US20140292479A1 (en) * 2007-04-19 2014-10-02 At&T Intellectual Property I, L.P. Access Authorization Servers, Methods and Computer Program Products Employing Wirleless Terminal Location
US9607201B1 (en) 2016-04-22 2017-03-28 Datalogic ADC, Inc. Systems and methods for non-permanent operator customization of a scanning device
US20170147354A1 (en) * 2015-11-25 2017-05-25 Getac Technology Corporation Electronic apparatus and booting method thereof
US9754132B2 (en) 2010-06-23 2017-09-05 The Western Union Company Multi-user device with information capture capabilities
US10510097B2 (en) 2011-10-19 2019-12-17 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
CN111630813A (en) * 2018-01-29 2020-09-04 三星电子株式会社 Electronic device, external electronic device, and system including electronic device and external electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5911044A (en) * 1996-11-08 1999-06-08 Ricoh Company, Ltd. Network image scanning system which transmits image information from a scanner over a network to a client computer
US6193161B1 (en) * 1998-10-23 2001-02-27 Telxon Corporation Bar code reader having independent bar code read activation data capabilities
US6758403B1 (en) * 2001-09-11 2004-07-06 Psc Scanning, Inc. System for editing data collection device message data
US20070022058A1 (en) * 2002-08-08 2007-01-25 Fujitsu Limited Wireless computer wallet for physical point of sale (POS) transactions
US7353510B2 (en) * 2003-07-11 2008-04-01 Computer Associates Think, Inc. System and method for comparing objects

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5911044A (en) * 1996-11-08 1999-06-08 Ricoh Company, Ltd. Network image scanning system which transmits image information from a scanner over a network to a client computer
US6193161B1 (en) * 1998-10-23 2001-02-27 Telxon Corporation Bar code reader having independent bar code read activation data capabilities
US6758403B1 (en) * 2001-09-11 2004-07-06 Psc Scanning, Inc. System for editing data collection device message data
US20070022058A1 (en) * 2002-08-08 2007-01-25 Fujitsu Limited Wireless computer wallet for physical point of sale (POS) transactions
US7353510B2 (en) * 2003-07-11 2008-04-01 Computer Associates Think, Inc. System and method for comparing objects

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140292479A1 (en) * 2007-04-19 2014-10-02 At&T Intellectual Property I, L.P. Access Authorization Servers, Methods and Computer Program Products Employing Wirleless Terminal Location
US9262877B2 (en) * 2007-04-19 2016-02-16 At&T Intellectual Property I, L.P. Access authorization servers, methods and computer program products employing wireless terminal location
US20170188236A1 (en) * 2008-08-15 2017-06-29 At&T Intellectual Property I, L.P. User identification in cell phones based on skin contact
US20180352437A1 (en) * 2008-08-15 2018-12-06 At&T Intellectual Property I, L.P. User identification in cell phones based on skin contact
US10743182B2 (en) * 2008-08-15 2020-08-11 At&T Intellectual Property I, L.P. User identification in cell phones based on skin contact
US10051471B2 (en) * 2008-08-15 2018-08-14 At&T Intellectual Property I, L.P. User identification in cell phones based on skin contact
US9264903B2 (en) 2008-08-15 2016-02-16 At&T Intellectual Property I, L.P. User identification in cell phones based on skin contact
US20100042827A1 (en) * 2008-08-15 2010-02-18 At&T Intellectual Property I, L.P. User identification in cell phones based on skin contact
US8913991B2 (en) * 2008-08-15 2014-12-16 At&T Intellectual Property I, L.P. User identification in cell phones based on skin contact
US9628600B2 (en) * 2008-08-15 2017-04-18 At&T Intellectual Property I, L.P. User identification in cell phones based on skin contact
US20100039214A1 (en) * 2008-08-15 2010-02-18 At&T Intellectual Property I, L.P. Cellphone display time-out based on skin contact
US20100085153A1 (en) * 2008-09-05 2010-04-08 Smith Gaylan S Biometric Control System and Method For Machinery
US8902044B2 (en) * 2008-09-05 2014-12-02 Gaylon Smith Biometric control system and method for machinery
US9210140B2 (en) * 2009-08-19 2015-12-08 Solarflare Communications, Inc. Remote functionality selection
US20110202983A1 (en) * 2009-08-19 2011-08-18 Solarflare Communications Incorporated Remote functionality selection
US9141955B2 (en) * 2010-06-23 2015-09-22 The Western Union Company Biometrically secured user input for forms
US9754132B2 (en) 2010-06-23 2017-09-05 The Western Union Company Multi-user device with information capture capabilities
US20110320352A1 (en) * 2010-06-23 2011-12-29 The Western Union Company Biometrically secured user input for forms
US10146760B2 (en) * 2010-06-23 2018-12-04 The Western Union Company Biometrically secured user input for forms
US10510097B2 (en) 2011-10-19 2019-12-17 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US11551263B2 (en) 2011-10-19 2023-01-10 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US10896442B2 (en) 2011-10-19 2021-01-19 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US20140026209A1 (en) * 2012-07-18 2014-01-23 Canon Kabushiki Kaisha Distribution device, image forming device, system, control method and storage medium
CN103023652A (en) * 2012-12-07 2013-04-03 康佳集团股份有限公司 Status identification method and system through bar code based on mobile terminal
US20140181710A1 (en) * 2012-12-26 2014-06-26 Harman International Industries, Incorporated Proximity location system
US10083044B2 (en) * 2015-11-25 2018-09-25 Getac Technology Corporation Electronic apparatus with a barcode scanning device and secure booting method thereof
US20170147354A1 (en) * 2015-11-25 2017-05-25 Getac Technology Corporation Electronic apparatus and booting method thereof
US9607201B1 (en) 2016-04-22 2017-03-28 Datalogic ADC, Inc. Systems and methods for non-permanent operator customization of a scanning device
CN111630813A (en) * 2018-01-29 2020-09-04 三星电子株式会社 Electronic device, external electronic device, and system including electronic device and external electronic device

Similar Documents

Publication Publication Date Title
US20080148395A1 (en) System and method for securing settings of a computing device
US20130007876A1 (en) System and method of providing biometric quick launch
US7882541B2 (en) Authentication system in information processing terminal using mobile information processing device
US9183683B2 (en) Method and system for access to secure resources
US20170155800A1 (en) Communication apparatus, recording medium, and communication system
EP3471070A1 (en) Configurable digital badge holder
US8838989B2 (en) Optimized biometric authentication method and system
EP1271436A2 (en) A mobile terminal authentication method and a mobile terminal therefor
US20150350200A1 (en) Biometric framework allowing independent application control
EP2083399B1 (en) Method, system and mobile device employing enhanced user authentication
EP1609043B1 (en) Apparatus for authorising access to an electronic device
EP2192519B1 (en) System and method of providing biometric quick launch
JP4321597B2 (en) Information processing apparatus, authentication system, authentication method, and authentication program
JP2006344185A (en) Authentication server and authentication program
WO2022208598A1 (en) Authentication system and authentication method
US20190286807A1 (en) Information device operating system, information device operating method and program
EP4081922A1 (en) Biometrically authenticated wireless identification device
EP2083544B1 (en) Optimized biometric authentication method and system
EP3989503B1 (en) Communication method and system
US20230216923A1 (en) Method and apparatus for commissioning a sensor
KR102328231B1 (en) Door lock based on IoT and method for inputting access authentication information thereof
US20230283735A1 (en) Image processing device, output system, and output method
US20230262048A1 (en) System and method for pin authentication issuance from mfp qr code
US20240086507A1 (en) Biometric authentication-based token
US11695762B2 (en) Heterogeneous device authentication system and heterogeneous device authentication method thereof

Legal Events

Date Code Title Description
AS Assignment

Owner name: SYMBOL TECHNOLOGIES, INC., NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROCK, CHRIS;REEL/FRAME:018462/0525

Effective date: 20061023

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION